Sciweavers

2049 search results - page 306 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
WWW
2008
ACM
15 years 12 months ago
Substructure similarity measurement in chinese recipes
Improving the precision of information retrieval has been a challenging issue on Chinese Web. As exemplified by Chinese recipes on the Web, it is not easy/natural for people to us...
Liping Wang, Qing Li, Na Li, Guozhu Dong, Yu Yang
KDD
2002
ACM
148views Data Mining» more  KDD 2002»
15 years 11 months ago
Tumor cell identification using features rules
Advances in imaging techniques have led to large repositories of images. There is an increasing demand for automated systems that can analyze complex medical images and extract me...
Bin Fang, Wynne Hsu, Mong-Li Lee
IDEAL
2009
Springer
15 years 5 months ago
Clustering with XCS and Agglomerative Rule Merging
Abstract. In this paper, we present a more effective approach to clustering with eXtended Classifier System (XCS) which is divided into two phases. The first phase is the XCS le...
Liangdong Shi, Yinghuan Shi, Yang Gao
HICSS
2007
IEEE
130views Biometrics» more  HICSS 2007»
15 years 5 months ago
Analysis of Activity in the Open Source Software Development Community
— Open Source Software is computer software for which the source code is publicly open for inspection, modification, and redistribution. While research of a few, large, successf...
Scott Christley, Gregory R. Madey
MSR
2010
ACM
15 years 4 months ago
A comparative exploration of FreeBSD bug lifetimes
—In this paper, we explore the viability of mining the basic data provided in bug repositories to predict bug lifetimes. We follow the method of Lucas D. Panjer as described in h...
Gargi Bougie, Christoph Treude, Daniel M. Germ&aac...